Feature-Selection and Mutual-Clustering Approaches to Improve DoS Detection and Maintain WSNs’ Lifetime
出版年份 2021 全文链接
标题
Feature-Selection and Mutual-Clustering Approaches to Improve DoS Detection and Maintain WSNs’ Lifetime
作者
关键词
-
出版物
SENSORS
Volume 21, Issue 14, Pages 4821
出版商
MDPI AG
发表日期
2021-07-15
DOI
10.3390/s21144821
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks
- (2021) Osama A. Khashan et al. Ad Hoc Networks
- Security and Privacy in Wireless Sensor Networks: Advances and Challenges
- (2020) Cheng-Chi Lee SENSORS
- A machine learning approach for imputation and anomaly detection in IoT environment
- (2020) Radhakrishna Vangipuram et al. EXPERT SYSTEMS
- Anomaly Detection in Smart Home Operation From User Behaviors and Home Conditions
- (2020) Masaaki Yamauchi et al. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
- A framework for anomaly detection and classification in Multiple IoT scenarios
- (2020) Francesco Cauteruccio et al. Future Generation Computer Systems-The International Journal of eScience
- A hybrid mine blast algorithm for feature selection problems
- (2020) Mohammed Alweshah et al. SOFT COMPUTING
- Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques
- (2020) Mohammad Nafis Ul Islam et al. WIRELESS PERSONAL COMMUNICATIONS
- Enhanced LEACH protocol for increasing a lifetime of WSNs
- (2019) Amer O. Abu Salem et al. Personal and Ubiquitous Computing
- Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset
- (2019) Nickolaos Koroniotis et al. Future Generation Computer Systems-The International Journal of eScience
- Research on routing optimization of WSNs based on improved LEACH protocol
- (2019) Haibo Liang et al. EURASIP Journal on Wireless Communications and Networking
- A survey of DDoS attacking techniques and defence mechanisms in the IoT network
- (2019) Ruchi Vishwakarma et al. TELECOMMUNICATION SYSTEMS
- A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept
- (2019) Gautam M. Borkar et al. Sustainable Computing-Informatics & Systems
- Hierarchical Learning Water Cycle Algorithm
- (2019) Caihua Chen et al. APPLIED SOFT COMPUTING
- A dynamic MLP-based DDoS attack detection method using feature selection and feedback
- (2019) Meng Wang et al. COMPUTERS & SECURITY
- A unified heuristic bat algorithm to optimize the LEACH protocol
- (2019) Xingjuan Cai et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- A survey on intrusion detection and prevention in wireless ad-hoc networks
- (2019) Khalid Khan et al. JOURNAL OF SYSTEMS ARCHITECTURE
- LSTM Learning With Bayesian and Gaussian Processing for Anomaly Detection in Industrial IoT
- (2019) Di Wu et al. IEEE Transactions on Industrial Informatics
- A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence
- (2018) Jieren Cheng et al. COMPUTER JOURNAL
- A survey on routing protocols supported by the Contiki Internet of things operating system
- (2018) Yousaf Bin Zikria et al. Future Generation Computer Systems-The International Journal of eScience
- Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model
- (2018) Lansheng Han et al. INFORMATION SCIENCES
- Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things
- (2018) Zhihua Cui et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network
- (2018) Bilal Ahmad et al. WIRELESS PERSONAL COMMUNICATIONS
- A new feature selection method to improve the document clustering using particle swarm optimization algorithm
- (2018) Laith Mohammad Abualigah et al. Journal of Computational Science
- Machine learning algorithms for wireless sensor networks: A survey
- (2018) D. Praveen Kumar et al. Information Fusion
- BPA-CRP: A balanced power-aware clustering and routing protocol for wireless sensor networks
- (2018) Khalid A. Darabkh et al. Ad Hoc Networks
- Variational data generative model for intrusion detection
- (2018) Manuel Lopez-Martin et al. KNOWLEDGE AND INFORMATION SYSTEMS
- A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks
- (2017) Ahmed Al-Baz et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application
- (2017) Priyan Malarvizhi Kumar et al. JOURNAL OF SUPERCOMPUTING
- Hybrid Whale Optimization Algorithm with simulated annealing for feature selection
- (2017) Majdi M. Mafarja et al. NEUROCOMPUTING
- A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT
- (2017) Guoyin Zhang et al. Security and Communication Networks
- A Survey on Successors of LEACH Protocol
- (2017) Sunil Kumar Singh et al. IEEE Access
- A Survey on Security and Privacy Issues in Internet-of-Things
- (2017) Yuchen Yang et al. IEEE Internet of Things Journal
- EA-CRP: A Novel Energy-aware Clustering and Routing Protocol in Wireless Sensor Networks
- (2017) Khalid A. Darabkh et al. COMPUTERS & ELECTRICAL ENGINEERING
- A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology
- (2016) Maha Bouaziz et al. COMPUTER COMMUNICATIONS
- Binary ant lion approaches for feature selection
- (2016) E. Emary et al. NEUROCOMPUTING
- WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
- (2016) Iman Almomani et al. Journal of Sensors
- An unsupervised feature selection algorithm based on ant colony optimization
- (2014) Sina Tabakhi et al. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
- A survey on feature selection methods
- (2013) Girish Chandrashekar et al. COMPUTERS & ELECTRICAL ENGINEERING
- A Survey of Intrusion Detection Systems in Wireless Sensor Networks
- (2013) Ismail Butun et al. IEEE Communications Surveys and Tutorials
- A three-stage unsupervised dimension reduction method for text clustering
- (2013) Kusum Kumari Bharti et al. Journal of Computational Science
- An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection
- (2012) Shih-Wei Lin et al. APPLIED SOFT COMPUTING
- Water cycle algorithm – A novel metaheuristic optimization method for solving constrained engineering optimization problems
- (2012) Hadi Eskandar et al. COMPUTERS & STRUCTURES
- A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks
- (2012) Sudhanshu Tyagi et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Energy efficiency of encryption schemes applied to wireless sensor networks
- (2011) Xueying Zhang et al. Security and Communication Networks
- A study on the use of statistical tests for experimentation with neural networks: Analysis of parametric test conditions and non-parametric tests
- (2008) Julián Luengo et al. EXPERT SYSTEMS WITH APPLICATIONS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started